Data security news, trends, analysis and practical advice

In IT security, worst case scenarios became commonplace in 2014, and there’s no end in sight. Headline-making data breaches will likely continue into this year, as businesses, governments and regulators play catch-up to this threat.

Microsoft patched a critical vulnerability Tuesday that put Windows computers at risk of full compromise, especially those in corporate networks.

A new report from Aberdeen Group shows how companies using ACM are achieving superior results in key measures such as staff utilization and quality of service levels by empowering employees with relevant and timely knowledge.

Facebook has built a platform where organizations can share information about the security threats they face in order to better fend off cyberattacks.

Like precocious teenagers, some employees don’t want to be told what to do when it comes to cyber security. Too many rules about what they can and cannot do with technology can lead to bad decisions that inadvertently put company data...

Everybody's talking about hackers and the NSA stealing our data. Here's how to do something about it.

Read this AIIM report to see more results from a recent survey on the adoption of case management solutions, and find out how leading organizations are integrating advanced case management systems to improve productivity, ROI, and

Anthem, one of the largest health insurers in the U.S., said Wednesday one of its IT systems was breached, resulting in the loss of customer and employee data.

Toshiba has released a line of USB sticks that contains a 10-digit keyboard to control access to data stored on the device through a PIN. But the new flash drive looks a lot like those produced by other companies as far back as seven...

In 2015 we expect to see cyber criminals, fueled by the success of many high profile hacks, continue to innovate with an even greater focus on deceiving and evading existing security solutions.

Credit card security lags in the U.S. We need to change that.

Chat logs and other digital records entered into evidence in a federal court case Monday detailed how the operators of the infamous Silk Road underground online marketplace planned to have individuals murdered for potentially...

Google has expanded its bug bounty programs to cover the company's official mobile applications, and is seeking to stimulate vulnerability research on particular products by offering money in advance to bug hunters.

If we learned anything in 2014, it was that no one is immune to a massive data breach. If one hits you this year, are you going to have the visibility that will let you tell the executive team what they need to know?